Exploit Pack - Project
☆74Nov 12, 2019Updated 6 years ago
Alternatives and similar repositories for exploitpack
Users that are interested in exploitpack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆14Sep 27, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- XploitSPY is an Android Monitoring / Spying Tool Modified By DedSec☆35Mar 31, 2020Updated 6 years ago
- Apache Solr <=8.2.0 Velocity Template 0day Exploit☆46Nov 2, 2019Updated 6 years ago
- Cve and Exploit Finder on the target☆28May 8, 2022Updated 3 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- A tool to locate people using social engineering.☆11Mar 13, 2022Updated 4 years ago
- A cross-platform remote administration tool written in Java☆19Aug 26, 2020Updated 5 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A tool to copy only the changed files to a new folder, useful to create incremental update packages.☆11Jan 27, 2022Updated 4 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆11Jan 5, 2024Updated 2 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Disassembly Generation and Processing for JARV1S☆15Jul 15, 2025Updated 8 months ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An Extended, Modulair, Host Discovery Framework☆42Jan 22, 2019Updated 7 years ago
- CVE-2020–14882 by Jang☆29Oct 29, 2020Updated 5 years ago
- ☆19Jun 8, 2017Updated 8 years ago
- Multi facebook Cracking With Random Numbercloning☆19Jan 16, 2024Updated 2 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆15Jan 30, 2023Updated 3 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- ☆19Dec 26, 2022Updated 3 years ago
- Captive Portal Evasion Tool☆15Sep 4, 2016Updated 9 years ago
- ☆12Oct 20, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Nov 11, 2022Updated 3 years ago
- gh0str3con is a All in one cloud based web Recon tool.☆24Jul 8, 2024Updated last year
- ☆15May 6, 2023Updated 2 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- Simple Python Script to bypass Facebook profile picture guard and get the profile picture at full resolution☆13Oct 23, 2019Updated 6 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago